From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Surveying IDS and firewall evading tools

Surveying IDS and firewall evading tools

From the course: Certified Ethical Hacker (CEH)

Surveying IDS and firewall evading tools

- [Instructor] Let's go over different tools designed to evade intrusion detection systems and firewalls. Understanding these tools is absolutely important for both evaluating security defenses and developing effective countermeasures within your environment. Now there are many different techniques and tools that actually assist. I have a few in my GitHub repository here, and one of the techniques for evasion is TTL manipulation. It's basically sending packets with a time to live or a TTL value that allows them to reach the IDS/IPS, but not the final destination. So the basic idea is the attacker sends a packet with a TTL. So let me actually draw an attacker here for short. It will send a packet with a TTL value or a time to leave value that allows them to reach, again, the IDS system or the IPS system, but not the final destination. Let's say the final destination in this case is host B, and this basically causes the IDS to inspect the packet, but it will never reach the intended…

Contents